Final Virtual Currency Applicability Report

·       
Risk Mitigation Strategy (4 Pages)

1)     
Based on what you have learned about risk management, dust off your competitive research spreadsheet, add a final column, and address the cybersecurity risk in each alternative and how to manage it. Address the application of virtual currency and encryption to other aspects of the institution’s cybersecurity. Where do they fit? Virtual currency could expand the attack vectors of cyber criminals. Include information on this expansion of cyberattack technologies. Summarize the risk implications that were found during your research in a one-page summary for the category of risk from your research.

2)     
Recognize the need to distinguish between the technology and policy issues that are involved. As an update to your ongoing analysis, categorize the risk as technical or policy. The classification is based on risk, not the solution. In other words, you might have documented what appears to be a technical condition or change that actually triggers a policy risk. As such, for the purpose of this reporting, it would be classified on the policy risk side of the ledger.

3)     
Now that you have categorized the risks, it’s time to consider risk management for virtual currency. Begin the process of addressing those risks from a strategic response perspective. What direction will be taken in the event of one or more of the identified risks occurring? This brief three-page report is an integral part of the Virtual Currency Applicability Report. It is not intended as a play-by-play procedures manual in the event of a breach. It is intended, as is the final report, as an overview of a strategic response should risk mitigation be required.

 

·       
Final Virtual Currency Applicability Report (13 Pages)

1)     
These next two steps will prepare you for the final submission of the Digital Currency Applicability Report. This is a separate information from the previous three but should represent as a formal document to stakeholders, additional elements should be present in the final Virtual Currency Applicability Report. This final report should easily reflect all three previous researches and supplemental materials. Provide an executive overview to set the stage and address concerns expressed and implied by the assignment. This will provide senior leadership streamlined information that you have found during the cybersecurity review of virtual currency and related concerns. This should include future opportunities and risks. Finally, a condensed conclusion should be prepared for the mitigation.

2)     
Organize the report with an executive overview and conclusion. Provide recommendations on other issues that may have yet to be addressed. As the CISO, the primary issue and area of expertise is cybersecurity. Senior leadership is likely going to want answers to several questions, such as: Can we use an encryption technology without virtual currency? Has a cost-benefit analysis been conducted? What would be the impact on our customers? As you can see, the concerns are not simply technical. The decision includes financial and policy questions that must be addressed.

#Final #Virtual #Currency #Applicability #Report

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Select one of the case studies at the end of

  Select one of the case studies at the end of either chapter 7 or chapter 8. After reading the case study, respond to the questions in a 3-4 page paper. The requirements below must be met for your paper to be accepted and graded: ·  Write between 750-1,000 words

Zero trust is a security stance for networking based on

Zero trust is a security stance for networking based on not trusting any users, devices, or applications by default, even those that are already on the network.The zero trust model uses identity and access management (IAM) as a foundation for an organization’s security program.For this assignment: Research the zero trust

Bi-weekly Practicum Journaling Every two weeks, you will submit a

  Bi-weekly Practicum Journaling Every two weeks, you will submit a reflective journal to the discussion forum for review by course faculty and your classmates. All are expected to engage and support one another by sharing these experiences in a supportive, constructive, professional environment. Journaling is an active learning technique

5. In his 2011 State of the Union Address, President

5. In his 2011 State of the Union Address, President Barack Obama said:”Our  infrastructure used to be the best, but our lead has slipped. South  Korean homes now have greater Internet access than we do. Countries in  Europe and Russia invest more in their roads and railways than we do.

1. Select a short story or chapter of a novel.

  1. Select a short story or chapter of a novel. 2. Read it to be analyzed as your Final Presentation. 3. Prepare a PowerPoint Presentation with your analysis. You will share in Class 7. Title Author/Biography Brief Summary Setting Characters/Characterization Problem /Conflict Plot Point of View Tone/Mood Theme Imagery

Windshield Survey Assessing the Community Source Data Essay Nursing Assignment Help

Windshield survey         Attached Files: Windshield survey spring 2019.docx                                                                     (21.944 KB)  Please find the information about a windshield survey on page 95 of the class textbook under “Assessing the community: source data”.  Attached you can find the details of what should be included in the survey. Expert Solution Preview As

Bloomberg – Premium Paper Help

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

Please help with homework Nursing Assignment Help

Medical Management Committees Managed care is a complex system involved in the financing and delivery of health care. The main goals of this system are to control access, quality, and cost of health care. MCOs have complex relationships or contracts with buyers (employers or individuals), providers (health care facilities and

1 postsMisconceptions What are some of the misconceptions about using

 1 postsMisconceptions What are some of the misconceptions about using CAM? Throw out some examples, what have you heard and what have you read about?    Using 200-300 words APA format with at least two references. Sources must be published within the last 5 years. There should be a mix

Research best practices in handling and storing digital evidence: Using

Research best practices in handling and storing digital evidence: Using your preferred Internet browser, perform a search for best practices in handling and storing digital evidence in a forensic investigation. Focus specifically on removable media. Using at least three credible references, prepare a one-paragraph summary of your findings, document your

Research problem statement: Businesses face daily uncertainty in the sphere

Research problem statement: Businesses face daily uncertainty in the sphere of global economic influence, volatile money markets, changing polical environments and the impact of how legacy technology will affect their business.  All these can lead to keep businesses from investing in their own progress and focus on the worng priorities. 

Scholars like John Ikenberry argue that the United States (US)

  Scholars like John Ikenberry argue that the United States (US) has played a leading role in the establishment of the liberal international order. Scholars debate the likely future of the liberal order and its prospects for accommodating rising powers, and the extent to which rising powers will agree or

Explain the overall research topic – Cybersecurity in healthcare Literature

Explain the overall research topic – Cybersecurity in healthcare Literature gathering process. The scope and the healthcare sector of the literature review.  The introduction should conclude with a paragraph that describes the sequence of the literature you will include and the literature analysis process.  After the introduction, you should incorporate

Ads target certain demographics. Businesses collect data on customers. Phones

 Ads target certain demographics. Businesses collect data on customers. Phones and internet connected devices listen in on conversations. Do you ever wish an advancement of technology never occurred or do you have an appreciation for an advancement of technology despite the risks to our privacy? Provide examples to support your

Consider a single-server queuing system for which the interarrival times

Consider a single-server queuing system for which the interarrival times are exponentially distributed. A customer who arrives and finds the server busy joins the end of a single queue. Service times of customers at the server are also exponentially distributed random variables. Upon completing service for a customer, the server